Audix : A PowerShell Tool To Quickly Configure Windows Event

4 years ago

Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring. Note: This tool will…

Serverless-Prey : Serverless Functions For Establishing Reverse Shells

4 years ago

Serverless-Prey is a collection of serverless functions (FaaS), that, once launched to a cloud environment and invoked, establish a TCP…

Lunar : A Lightweight Native DLL Mapping Library

4 years ago

Lunar is a lightweight native DLL mapping library that supports mapping directly from memory. Features Imports and delay imports are…

Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

4 years ago

Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land…

Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts

4 years ago

Eavesarp a reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is…

Richkit : Domain Enrichment Toolkit

4 years ago

Richkit is a python3 package that provides tools taking a domain name as input, and returns additional information on that…

Chromepass : Hacking Chrome Saved Passwords

4 years ago

Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved paswordsSend a…

Tentacle : A POC Vulnerability Verification & Exploit Framework

4 years ago

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It…

Tails – Live System To Preserve Your Privacy & Anonymity

4 years ago

The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot. This release also…

How to Send a Fax Without a Phone Line? With Fax Online Service

4 years ago

Most people today are unaware of what a fax is, leave alone how to operate a fax machine. Although it…